Real-Time Security Risk Assessment From CCTV Using Hand Gesture Recognition

被引:5
作者
Koca, Murat [1 ]
机构
[1] Van Yuzuncu Yil Univ, Fac Engn, Dept Comp Engn, TR-65080 Tusba, Turkiye
关键词
CCTV footage; deep learning; cyber security; hand gesture recognition; media-pipe; metadata extraction; security risk assessment;
D O I
10.1109/ACCESS.2024.3412930
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Closed-Circuit Television (CCTV) surveillance systems, long associated with physical security, are becoming more crucial when combined with cybersecurity measures. Combining traditional surveillance with cyber defenses is a flexible method for protecting against both physical and digital dangers. This study introduces the use of convolutional neural networks (CNNs) and hand gesture detection using CCTV data to perform real-time security risk assessments. The suggested method's emphasis on automated extraction of key information, such as identity and behavior, illustrates its special use in silent or acoustically challenging settings. This study uses deep learning techniques to develop a novel approach for detecting hand gestures in CCTV images by automatically extracting relevant features using a media-pipe architecture. For instance, it facilitates risk assessment through the use of hand gestures in noisy environments or muted audio streams. Given this method's uniqueness and efficiency, the suggested solution will be able to alert appropriate authorities in the event of a security breach. There seems to be considerable opportunity for the development of applications in several domains of security, law enforcement, and public safety, including but not limited to shopping malls, educational institutions, transportation, the armed forces, theft, abduction, etc.
引用
收藏
页码:84548 / 84555
页数:8
相关论文
共 25 条
[21]  
Sacharoff L., 2020, William Mary LawRev., V62, P571
[22]   Gesture Recognition for American Sign Language Using Pytorch and Convolutional Neural Network [J].
Sethia, Devashsih ;
Singh, Pallavi ;
Mohapatra, B. .
INTELLIGENT SYSTEMS AND APPLICATIONS, ICISA 2022, 2023, 959 :307-317
[23]  
Sheldon B., 2011, International Review of Law, Computers Technology, V25, P193, DOI [DOI 10.1080/13600869.2011.617494, 10.1080/13600869.2011, DOI 10.1080/13600869.2011]
[24]  
Williams ChrisA., 2003, Crime Prevention and Community Safety: An International Journal, V5, P27, DOI DOI 10.1057/PALGRAVE.CPCS.8140153
[25]  
Zeng ZX, 2019, PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), P1062, DOI [10.1109/itnec.2019.8729185, 10.1109/ITNEC.2019.8729185]